SlideShare a Scribd company logo
1 of 20
1
Table of Contents
1.0 Introduction ............................................................................................................................3
1.1 Company Background..........................................................................................................3
1.2 Team Member’s Roles .........................................................................................................3
2.0 Scope of Work ........................................................................................................................3
2.1 Coverage of Work................................................................................................................3
2.2 Devices & Equipment Used..................................................................................................3
3.0 Feasibility Study......................................................................................................................7
3.1 Network Scope....................................................................................................................7
3.2 Objectives ...........................................................................................................................7
3.3 Design Features and Coverage..............................................................................................7
3.4 Design Assumptions ............................................................................................................8
4.0 Network Needs Analysis ..........................................................................................................8
4.1 Data Types & Sources for Daily Operations ..........................................................................8
4.2 Number of Users & Priority Levels .......................................................................................8
4.3 Security Requirements .........................................................................................................9
4.4 Transmission Speed Requirements ........................................................................................9
4.5 Load Variations Estimates....................................................................................................9
4.6 Reliability Requirements..........................................................................................................10
5.0 Network Diagram and Topologies ..........................................................................................10
5.1 Site 1 – IT Department.......................................................................................................10
5.2 Site 2 – ATM.....................................................................................................................12
5.3 Site 3 – Consumer Banking ................................................................................................12
5.4 Site 4 – Investment Banking ...............................................................................................13
5.5 Site 5 – Loans....................................................................................................................13
5.6 Site 6 – Insurance ..............................................................................................................14
5.7 Site 7 – Guest Wifi.............................................................................................................14
5.8 Site 8 – Site-to-site VPN ....................................................................................................15
5.9 Overview of entire network................................................................................................16
6.0 Items and Labor cost..............................................................................................................17
7.0 Network Disaster Recovery Planning ...........................................................................................17
7.1 Objectives of Disaster Recovery Plan .......................................................................................18
7.2 Risk Assessments....................................................................................................................19
7.3 Emergency Response Procedure...............................................................................................19
2
7.4 Recovery Response Procedure..................................................................................................19
8.0 References..................................................................................................................................20
3
1.0 Introduction
1.1 Company Background
AHB Bank is setting up a new 3-storey branch in Glenmarie Business Park, Shah Alam Malaysia.
It is planning to have 6 departments allocated on their new branch in Glenmarie Business Park.
AHB Bank proposed to have departments of internal IT supports, ATM services, consumer
banking, investment banking, loans and insurance. All their departments network is separated but
able to communicate with each other using an internal chatting system using a port. AHB Bank
has a budget of RM200,000 and prefer the branch to have a balance between network performance
network performance, security and cost effectiveness.
1.2 Team Member’s Roles
Below are the team member’s roles when implementing the network system for AHB Bank.
Ong Kha Hong – Lead Network Engineer
Nicholas Lim Eng Han- Network Administrator
2.0 Scope of Work
2.1 Coverage of Work
Ong Kha Hong is responsible for implementing, maintaining, supporting, developing and, in some
cases, designing communication networks within an organization. His focus is to ensure that high
availability and stable network infrastructure to provide maximum performance for their users.
Occasionally he will help on documents and perform analysis of all networking topologies.
Nicholas Lim Eng Han is responsible for the day-to-day operation to maintaining computer
network and solving the problems that might occur to them. Mainly focusing on installing and
configuring computer networks and identifying any problems that arise with computer networks
and system. He also helps on prepare research plans and documented projects for all LAN and
WAN based methods. Identify and resolve all technical issues in the matter of formulation and
creation of strategies.
2.2 Devices & Equipment Used
4
IT Department
Device Model Port IP Address Subnet Mask Default
gateway
IT Admin PC-PT Fe0 192.168.10.100 255.255.255.0 192.168.10.1
IT Admin2 PC-PT Fe0 192.168.10.200 255.255.255.0 192.168.10.1
Server Server-PT Fe0 192.168.10.254 255.255.255.0 N/A
SwitchIT 2960-
24TT
N/A N/A N/A N/A
Table 1: IT department
ATM
Device Model Port IP Address Subnet Mask Default
gateway
ATM PC-PT Fe0 192.168.20.101 255.255.255.0 192.168.20.1
ATM2 PC-PT Fe0 192.168.20.201 255.255.255.0 192.168.20.1
ATM3 PC-PT Fe0 192.168.20.301 255.255.255.0 192.168.20.1
SwitchATM 2960-
24TT
N/A N/A N/A N/A
Table 2: ATM
Consumer Banking
Device Model Port IP Address Subnet Mask Default
gateway
ConsuPC PC-PT Fe0 192.168.30.101 255.255.255.0 192.168.30.1
ConsuPC2 PC-PT Fe0 192.168.30.201 255.255.255.0 192.168.30.1
ConsuPC3 PC-PT Fe0 192.168.30.301 255.255.255.0 192.168.30.1
SwitchConsumer 2960-
24TT
N/A N/A N/A N/A
Table 3: Consumer Banking
Investment Banking
Device Model Port IP Address Subnet Mask Default
gateway
5
InvestPC PC-PT Fe0 192.168.40.101 255.255.255.0 192.168.40.1
InvestPC2 PC-PT Fe0 192.168.40.201 255.255.255.0 192.168.40.1
InvestPC3 PC-PT Fe0 192.168.40.301 255.255.255.0 192.168.40.1
SwitchInvest 2960-
24TT
N/A N/A N/A N/A
Table 4: Investment Banking
Loans
Device Model Port IP Address Subnet Mask Default
gateway
LoansPC PC-PT Fe0 192.168.50.101 255.255.255.0 192.168.50.1
LoansPC2 PC-PT Fe0 192.168.50.201 255.255.255.0 192.168.50.1
LoansPC3 PC-PT Fe0 192.168.50.301 255.255.255.0 192.168.50.1
SwitchLoans 2960-
24TT
N/A N/A N/A N/A
Table 5: Loans
Insurance
Device Model Port IP Address Subnet Mask Default
gateway
InsuPC PC-PT Fe0 192.168.60.101 255.255.255.0 192.168.60.1
InsuPC2 PC-PT Fe0 192.168.60.201 255.255.255.0 192.168.60.1
InsuPC3 PC-PT Fe0 192.168.60.301 255.255.255.0 192.168.60.1
SwitchInsu 2960-
24TT
N/A N/A N/A N/A
Table 6: Insurance
Guest WiFi
Device Model Port IP Address Subnet Mask Default
gateway
Guest-Wifi
Router
HomeRouter-
PT-AC
N/A N/A N/A N/A
6
GuestDevic
e
SMARTPHON
E-PT
Wireless
0
192.168.70.
2
255.255.255.
0
192.168.70.
1
Table 7: Guest WiFi
Multilayer Switch
Device Model Port IP Address Subnet Mask Default
gateway
Multi-sw
1(MAIN)
3650-24PS Vlan10 192.168.10.1 255.255.255.0 N/A
Vlan11 192.168.20.1 255.255.255.0
Vlan12 192.168.30.1 255.255.255.0
Vlan13 192.168.40.1 255.255.255.0
Vlan14 192.168.50.1 255.255.255.0
Vlan15 192.168.60.1 255.255.255.0
Vlan16 192.168.70.1 255.255.255.0
Vlan17 192.168.80.1 255.255.255.0
Table 8: Multilayer Switch
7
3.0 Feasibility Study
3.1 Network Scope
This proposed network is designed for AHB Bank in Glenmarie Business Park, Shah Alam
Malaysia. Ashyaf, who is our client requires 6 main departments for their new outlet which are:
 Internal IT support
 ATM services
 Consumer Banking
 Investment Banking
 Loans
 Insurance
AHB Bank provided us with a budget of RM200,000 to design a network for them that has high
performance and cost effectiveness.
3.2 Objectives
Below are the main goals of the network being to achieve several operational objectives which are:
 Every department network is separated. All staffs can communicate through emails and an
internal chatting system using port 465.
 There shouldbe aguest Wi-Fi is provided to customers. This is an isolated network isolated
with only web browsing capabilities.
 The IT department consists of a small team that the staffs are mainly performing
operational tasks instead of planning and implementations. Your team is required to
provide detail documentations so that the IT staffs can troubleshoot their systems with
references.
 Your team are working to strike a balance between network performance, security and cost
effectiveness so that your team can close this deal.
3.3 DesignFeatures and Coverage
One of the features that we apply is ACL (Access Control-List)
Vlan/Subnet ACL Permission
Vlan10: IT
Department
- Remote access (SSH) to all the networking devices for
troubleshooting, except ATM network.
8
- perform remote into the branch through VPN for
troubleshooting.
- communicate throught emails and an internal chatting system
using port 465.
Vlan11:
ATM
- Isolated network and directly connect to Headquarter network
through 5556 port.
- All staffs including IT support has no access to the ATM
network.
Vlan12:
Consumer
Banking
- communicate throught emails and an internal chatting system
using port 465.
Vlan13:
Investment
Banking
- communicate throught emails and an internal chatting system
using port 465.
- Internet access (HTTP and HTTPS only) to support overseas
customers.
Vlan14:
Loans
- communicate throught emails and an internal chatting system
using port 465.
- Internet access with port 9999 to check customer credit
scores.
Vlan15:
Insurance
- communicate throught emails and an internal chatting system
using port 465.
- port 7772 to connect to national insurance portal.
-No internet access.
Vlan16:
Guest Wifi
-Only can connect to WiFi
Table 9: Access Control List Permissions
3.4 DesignAssumptions
This network design is only meant for a small scale organisation (AHB Bank) where the
access point could support approximately 200 users. The extra or unused port either on
layer 2 or 3 switch could be reserved for further use especially when there is a need of
expanding the network usage.
4.0 Network Needs Analysis
4.1 Data Types & Sources for Daily Operations
4.2 Number of Users & Priority Levels
The consumer department would be the main users that occupies 60% of the network usage while
the IT department would have the highest priority where they are tasked with taking care of
networking devices of AHB bank and they are able to Access all the department’s network with
the ability to provide VPN services to remote department and perform actions. The ATM
9
department occupies 15% of the network usage and it is isolated network and directly connect to
Headquarter network. The loans and Investment Department will also occupies 10% each of the
network usage for check the customer credit score and support overseas customers. While the rest
of the departments are within low priority as they do not require to use the network extensively
compared to the other departments.
4.3 Security Requirements
Here are the main objectives of our network’s security requirements which comprises of:
- Users are required to change their password every 90 days.
- The IT Department are given the privilege to access all the group’s network
and they are able to conduct troubleshooting activities remotely to all the
groups’ network.
- Firewalls will be implemented within the server to prevent unauthorized users
from accessing the networks.
- All routers are provided with the security of radius aaa server and have their
own usernames and passwords.
4.4 Transmission SpeedRequirements
We recommend a minimum connectivity speed of 100 Mbps and a target speed of 1 Gbps
per 100 users for AHB Bank by 2019. In preparing for nextgeneration applications, it is
critical to replace 100 Mbps shared-bandwidth hubs in the wiring closet with Ethernet and
Fast Ethernet (100/1000 Mbps) or Gigabit Ethernet (10000 Mbps) switches. These
switches dedicate 100-, 1000- or 10000-Mbps bandwidth to an individual LAN or WLAN
node.
4.5 Load Variations Estimates
Based on AHB Bank operating hours, the network will be mainly used during the weekdays
from 9 a.m to 5 p.m from Monday to Friday. Peak network traffic volume is expected to
experience during 10 a.m up till 4 p.m.
10
Average required throughput upon LAN during work hours are 5 Mbps while expected
peak traffic load would be ranging 10 Mbps - 20 Mbps. We are designing the network in
such a way to accommodate the peak traffic load instead of the average required throughput.
4.6 Reliability Requirements
The network will be designed to be running with an expected uptime of 99.99% with an
undiscovered error rate of 0.01%.
5.0 Network Diagramand Topologies
5.1 Site 1 – IT Department
Figure 1: Site 1 - IT Dept. Design
This site consists of 2 IT administrators, and 1 server. The default gateway got IT
Department is 192.168.10.1/24. IT Department is using VLAN 10 to control access
between the groups.
11
Figure 2: Main Multilayer Switch (Layer 3 Switch)
Trunk (encapsulation dot1q) is used at the Multilayer switch (layer 3 switch) as we want
create VLAN traffic between the switches. A trunk connection is a normal link that is able
to pass traffic from different VLANs and has a method to separate traffic between VLANs.
DHCP protocol are used on layer 3 switch so that it could enable automatic assignment of
IP configurations for nodes on the network. It is efficient as we do not have to assign all
the IP addresses manually. The DHCP server accepts address assignment requests and
renewals from the client and assigns the addresses from predefined groups of addresses
within DHCP address pools. These address pools are also be configured to supply
additional information to the requesting client such as the IP address of the Domain Name
System (DNS) server.
12
5.2 Site 2 – ATM
Figure 3: Site 2 -ATM. Design
As for site 2, this would be the ATM Department which consists 3 ATM and 1 Switch of
ATM. ATM Department is using VLAN 11 to control access between the departments.
5.3 Site 3 – Consumer Banking
Figure 4: Site 3 - Consumer Banking. Design
The figure above is the site dedicated for the Consumer Banking department. It consists 3
Consumer PC and 1 Switch for Consumer Department, and it’s using VLAN 12 to control
access between the departments.
13
5.4 Site 4 – Investment Banking
Figure 5: Site 4 - Investment Banking Design
As for Site 4, This is Investment Banking which consists 3 PC of Investment and 1 switch
for using VLAN 13 to control access between the department.
5.5 Site 5 – Loans
Figure 6: Site 5 - Loans Design
This Site 5 is for the Loans Department and its consists 3 Loans PC for staff and 1 switch
for Loans Department. Its using VLAN 14 to control access between the departments.
14
5.6 Site 6 – Insurance
Figure 7: Site 6 - Insurance Design
The figure above is the site dedicated for the Insurance department. It consists 3 Insurance
PC for staff and 1 Switch for Insurance Department, and it’s using VLAN 15 to control
access between the departments.
5.7 Site 7 – Guest Wifi
Figure 8: Guest Wifi Design
As for Site 4, This is Guest Wifi Design which only consists 1 Wireless router and 1
example device of user for access into internet. Its using VLAN 16 that only allow users to
access the internet.
15
5.8 Site 8 – Site-to-site VPN
Figure 9: VPN Design
Site-to-Site IPSec VPN Tunnels are used to allow the secure transmission of data and
perform remote into the branch for troubleshooting. The VPN tunnel is created over the Internet
public network and encrypted using a number of advanced encryption algorithms to provide
confidentiality of the data transmitted between the two sites.
16
5.9 Overview of entire network
17
6.0 Items and Labor cost
Model Quantity Price per unit (RM) Total (RM)
Hardware cost
WS-C2960-24TT-L
Cisco 2960 Switch
6 963 5778
CISCO1841 Cisco
1841 Router
2 2445 4890
WS-C3650-24PS-S
Catalyst 3650
Switch
1 5121 5121
100m CAT5e
Ethernet Cable
40 212 8480
TP-LINK EAP115 1 179 179
Cisco ISR4321-
AX/K9 ISR 4321
1 4978 4978
Cisco UCS C-Series
Rack Servers
1 6573 6573
PC 14 5000 70000
Total (RM) 105999
Labor / intangible cost
Unifi 100Mbps (per
month
125 125
Technical support
(per month)
5 4000 20000
Electrician 5 3000 15000
Network design and
planning (hours)
24(hours) 20000 20000
Total (RM) 161124
Table 10: Items and Labor Cost
7.0 Network DisasterRecovery Planning
A network disaster recovery plan includes a set of procedures required to effectively respond to a
disaster that affects a network and causes its disruption. The main purpose of network disaster
recovery is to ensure that services can be delivered to customers despite a disruption in network
connectivity.
 Back up network configuration files
The main aim is to ensure that a network is restored to its normal state as rapidly as possible.
That is why it is important to regularly back up network configuration files, including the initial
18
parameters and settings for configuring network devices. Regarding this, you are advice to install
third-party data protection software, which can be used to back up and recover critical data when
your infrastructure is hit by a disaster.
 Regularly test and update the plan
By regularly testing and updating network disaster plans, it will reduce the chances of panicking
when a network disaster occurs. IT recovery team will be more ready and prepared to deal with
network disasters.
 Assess potential risks and threats
You also need to determine risks and threats which your organization is most exposed to that can
disrupt your network services. After assessing potential dangers, you can come up with
preventive measures to stop them from occurring to reduce the possible impact on your
infrastructure.
 Create an IT recovery team and assign responsibilities
It is not enough to create a network disaster recovery plan; you should also decide who will
implement the plan when an actual disaster strikes. So, by having an IT team recovery team will
have the organization prepared for disaster recovery. Each recovery team member should be
assigned with a specific role and a unique set of responsibilities to avoid any confusion and panic
during a disaster recovery event.
 Document steps of the network disaster recovery process.
By documenting the steps of the network disaster recovery process will avoid confusion when
the actual network disaster occurs. By listing the document also helps identify the weakness of
the infrastructure of the organization which indirectly reduce network disaster from occurring.
7.1 Objectives of DisasterRecovery Plan
 To limitthe extentof disruptionanddamage.
 To minimize the economicimpactof the interruption.
 To establishanalternativemeansof operationinadvance.
 To train personnel withemergencyprocedures
19
7.2 Risk Assessments
 Identify Possible Threats A high-level risk assessment can still be done by involving the
simplest network component where it can still pose a threat if it has an IP address on the
network, stores any sensitive data, and/or allows users to access it over the network.
 Rate Each Risk and Impact Each risk is can be classified as low, medium or high risk.
This helps to prioritize where you should focus most of your effort initially, and you
work down your list to the medium and low-risk resources.
 Analyze Your Protection Firewalls and antivirus software installed on desktops. Analyze
any cyber security protection in place, because it reduces risk. This step might affect your
priority because you could have a high-priority item that already has the best protection.
This type of resource would then be a lower priority.
7.3 Emergency Response Procedure
 Evaluate current plans, procedures and incident
 Identify hazards
 Emergency resources
 Review codes and regulations
 Training Programs
 Communication
 Write the plan
7.4 Recovery Response Procedure
Prevention
 Focuses on creating concrete plans, training, hazard response plans and exercises well
ahead of a disaster to prepare your organization, through proactive planning
Preparedness
20
 A continuous cycle of planning, organizing, training, equipping, exercising, evaluating,
and taking corrective action.
Mitigation
 Effort to reduce loss property by developing structural and non-structural measures that
will mitigate the effects of a disaster
8.0 References
A Short Guide to Network Disaster Recovery Planning. (2019, March 5). Retrieved from
https://www.nakivo.com/blog/create-effective-network-disaster-recovery-plan/

More Related Content

What's hot

Computer management (HND in Networking)
Computer management (HND in Networking)Computer management (HND in Networking)
Computer management (HND in Networking)
L.Naresh Naresh
 
Java Technical Design Document
Java Technical Design DocumentJava Technical Design Document
Java Technical Design Document
Deborah Obasogie
 

What's hot (20)

Ite pc v40_chapter5
Ite pc v40_chapter5Ite pc v40_chapter5
Ite pc v40_chapter5
 
Ite pc v40_chapter1
Ite pc v40_chapter1Ite pc v40_chapter1
Ite pc v40_chapter1
 
Ite pc v40_chapter3
Ite pc v40_chapter3Ite pc v40_chapter3
Ite pc v40_chapter3
 
IT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 14 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 14 Exam Answers
 
ITE - Chapter 3
ITE - Chapter 3ITE - Chapter 3
ITE - Chapter 3
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with Privacy
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
johnsonbros
johnsonbrosjohnsonbros
johnsonbros
 
Live chat srs
Live chat srsLive chat srs
Live chat srs
 
Ite pc v40_chapter4
Ite pc v40_chapter4Ite pc v40_chapter4
Ite pc v40_chapter4
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Computer management (HND in Networking)
Computer management (HND in Networking)Computer management (HND in Networking)
Computer management (HND in Networking)
 
Design hotspot With Opensource Tools
Design hotspot With Opensource ToolsDesign hotspot With Opensource Tools
Design hotspot With Opensource Tools
 
Java Technical Design Document
Java Technical Design DocumentJava Technical Design Document
Java Technical Design Document
 
Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020
 
Windows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of theWindows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of the
 
Web OS in Cloud Computing: A Case study
Web OS in Cloud Computing: A Case studyWeb OS in Cloud Computing: A Case study
Web OS in Cloud Computing: A Case study
 
Comparison of the network performance
Comparison of the network performanceComparison of the network performance
Comparison of the network performance
 
Documentation
DocumentationDocumentation
Documentation
 
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityB Sc IT II Sem NHSB Networking For Home And Small Business Amity University
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
 

Similar to Networksecurity

Estimate Of I
Estimate Of IEstimate Of I
Estimate Of I
Raju Nair
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINAL
John Bernal
 
VoIP GP ( Updated with Int )
VoIP GP ( Updated with Int )VoIP GP ( Updated with Int )
VoIP GP ( Updated with Int )
Ahmed Al-Dabbagh
 

Similar to Networksecurity (20)

Estimate Of I
Estimate Of IEstimate Of I
Estimate Of I
 
Starter Tutorials on Reliable Lan Switching
Starter Tutorials on Reliable Lan SwitchingStarter Tutorials on Reliable Lan Switching
Starter Tutorials on Reliable Lan Switching
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINAL
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Ftth development manual part1 (1)
Ftth development manual part1 (1)Ftth development manual part1 (1)
Ftth development manual part1 (1)
 
Oracl apps api usages
Oracl apps api usagesOracl apps api usages
Oracl apps api usages
 
Oc130 v4hp3000ug
Oc130 v4hp3000ugOc130 v4hp3000ug
Oc130 v4hp3000ug
 
Web application developers_guide_sip_polycom
Web application developers_guide_sip_polycomWeb application developers_guide_sip_polycom
Web application developers_guide_sip_polycom
 
Install
InstallInstall
Install
 
Config Guide Ip Sec
Config Guide Ip SecConfig Guide Ip Sec
Config Guide Ip Sec
 
Kylewoodman cisco
Kylewoodman ciscoKylewoodman cisco
Kylewoodman cisco
 
Configuration guide legacy
Configuration guide legacyConfiguration guide legacy
Configuration guide legacy
 
802801 gbm
802801 gbm802801 gbm
802801 gbm
 
172809159 sip
172809159 sip172809159 sip
172809159 sip
 
Fwd conn configguide_5.2.5.6403.0
Fwd conn configguide_5.2.5.6403.0Fwd conn configguide_5.2.5.6403.0
Fwd conn configguide_5.2.5.6403.0
 
VoIP GP ( Updated with Int )
VoIP GP ( Updated with Int )VoIP GP ( Updated with Int )
VoIP GP ( Updated with Int )
 
Secure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsSecure Management of Access to Privileged Accounts
Secure Management of Access to Privileged Accounts
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 
Siemens s7 300-400-fibel-e
Siemens s7 300-400-fibel-eSiemens s7 300-400-fibel-e
Siemens s7 300-400-fibel-e
 
121ontapi
121ontapi121ontapi
121ontapi
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Networksecurity

  • 1. 1 Table of Contents 1.0 Introduction ............................................................................................................................3 1.1 Company Background..........................................................................................................3 1.2 Team Member’s Roles .........................................................................................................3 2.0 Scope of Work ........................................................................................................................3 2.1 Coverage of Work................................................................................................................3 2.2 Devices & Equipment Used..................................................................................................3 3.0 Feasibility Study......................................................................................................................7 3.1 Network Scope....................................................................................................................7 3.2 Objectives ...........................................................................................................................7 3.3 Design Features and Coverage..............................................................................................7 3.4 Design Assumptions ............................................................................................................8 4.0 Network Needs Analysis ..........................................................................................................8 4.1 Data Types & Sources for Daily Operations ..........................................................................8 4.2 Number of Users & Priority Levels .......................................................................................8 4.3 Security Requirements .........................................................................................................9 4.4 Transmission Speed Requirements ........................................................................................9 4.5 Load Variations Estimates....................................................................................................9 4.6 Reliability Requirements..........................................................................................................10 5.0 Network Diagram and Topologies ..........................................................................................10 5.1 Site 1 – IT Department.......................................................................................................10 5.2 Site 2 – ATM.....................................................................................................................12 5.3 Site 3 – Consumer Banking ................................................................................................12 5.4 Site 4 – Investment Banking ...............................................................................................13 5.5 Site 5 – Loans....................................................................................................................13 5.6 Site 6 – Insurance ..............................................................................................................14 5.7 Site 7 – Guest Wifi.............................................................................................................14 5.8 Site 8 – Site-to-site VPN ....................................................................................................15 5.9 Overview of entire network................................................................................................16 6.0 Items and Labor cost..............................................................................................................17 7.0 Network Disaster Recovery Planning ...........................................................................................17 7.1 Objectives of Disaster Recovery Plan .......................................................................................18 7.2 Risk Assessments....................................................................................................................19 7.3 Emergency Response Procedure...............................................................................................19
  • 2. 2 7.4 Recovery Response Procedure..................................................................................................19 8.0 References..................................................................................................................................20
  • 3. 3 1.0 Introduction 1.1 Company Background AHB Bank is setting up a new 3-storey branch in Glenmarie Business Park, Shah Alam Malaysia. It is planning to have 6 departments allocated on their new branch in Glenmarie Business Park. AHB Bank proposed to have departments of internal IT supports, ATM services, consumer banking, investment banking, loans and insurance. All their departments network is separated but able to communicate with each other using an internal chatting system using a port. AHB Bank has a budget of RM200,000 and prefer the branch to have a balance between network performance network performance, security and cost effectiveness. 1.2 Team Member’s Roles Below are the team member’s roles when implementing the network system for AHB Bank. Ong Kha Hong – Lead Network Engineer Nicholas Lim Eng Han- Network Administrator 2.0 Scope of Work 2.1 Coverage of Work Ong Kha Hong is responsible for implementing, maintaining, supporting, developing and, in some cases, designing communication networks within an organization. His focus is to ensure that high availability and stable network infrastructure to provide maximum performance for their users. Occasionally he will help on documents and perform analysis of all networking topologies. Nicholas Lim Eng Han is responsible for the day-to-day operation to maintaining computer network and solving the problems that might occur to them. Mainly focusing on installing and configuring computer networks and identifying any problems that arise with computer networks and system. He also helps on prepare research plans and documented projects for all LAN and WAN based methods. Identify and resolve all technical issues in the matter of formulation and creation of strategies. 2.2 Devices & Equipment Used
  • 4. 4 IT Department Device Model Port IP Address Subnet Mask Default gateway IT Admin PC-PT Fe0 192.168.10.100 255.255.255.0 192.168.10.1 IT Admin2 PC-PT Fe0 192.168.10.200 255.255.255.0 192.168.10.1 Server Server-PT Fe0 192.168.10.254 255.255.255.0 N/A SwitchIT 2960- 24TT N/A N/A N/A N/A Table 1: IT department ATM Device Model Port IP Address Subnet Mask Default gateway ATM PC-PT Fe0 192.168.20.101 255.255.255.0 192.168.20.1 ATM2 PC-PT Fe0 192.168.20.201 255.255.255.0 192.168.20.1 ATM3 PC-PT Fe0 192.168.20.301 255.255.255.0 192.168.20.1 SwitchATM 2960- 24TT N/A N/A N/A N/A Table 2: ATM Consumer Banking Device Model Port IP Address Subnet Mask Default gateway ConsuPC PC-PT Fe0 192.168.30.101 255.255.255.0 192.168.30.1 ConsuPC2 PC-PT Fe0 192.168.30.201 255.255.255.0 192.168.30.1 ConsuPC3 PC-PT Fe0 192.168.30.301 255.255.255.0 192.168.30.1 SwitchConsumer 2960- 24TT N/A N/A N/A N/A Table 3: Consumer Banking Investment Banking Device Model Port IP Address Subnet Mask Default gateway
  • 5. 5 InvestPC PC-PT Fe0 192.168.40.101 255.255.255.0 192.168.40.1 InvestPC2 PC-PT Fe0 192.168.40.201 255.255.255.0 192.168.40.1 InvestPC3 PC-PT Fe0 192.168.40.301 255.255.255.0 192.168.40.1 SwitchInvest 2960- 24TT N/A N/A N/A N/A Table 4: Investment Banking Loans Device Model Port IP Address Subnet Mask Default gateway LoansPC PC-PT Fe0 192.168.50.101 255.255.255.0 192.168.50.1 LoansPC2 PC-PT Fe0 192.168.50.201 255.255.255.0 192.168.50.1 LoansPC3 PC-PT Fe0 192.168.50.301 255.255.255.0 192.168.50.1 SwitchLoans 2960- 24TT N/A N/A N/A N/A Table 5: Loans Insurance Device Model Port IP Address Subnet Mask Default gateway InsuPC PC-PT Fe0 192.168.60.101 255.255.255.0 192.168.60.1 InsuPC2 PC-PT Fe0 192.168.60.201 255.255.255.0 192.168.60.1 InsuPC3 PC-PT Fe0 192.168.60.301 255.255.255.0 192.168.60.1 SwitchInsu 2960- 24TT N/A N/A N/A N/A Table 6: Insurance Guest WiFi Device Model Port IP Address Subnet Mask Default gateway Guest-Wifi Router HomeRouter- PT-AC N/A N/A N/A N/A
  • 6. 6 GuestDevic e SMARTPHON E-PT Wireless 0 192.168.70. 2 255.255.255. 0 192.168.70. 1 Table 7: Guest WiFi Multilayer Switch Device Model Port IP Address Subnet Mask Default gateway Multi-sw 1(MAIN) 3650-24PS Vlan10 192.168.10.1 255.255.255.0 N/A Vlan11 192.168.20.1 255.255.255.0 Vlan12 192.168.30.1 255.255.255.0 Vlan13 192.168.40.1 255.255.255.0 Vlan14 192.168.50.1 255.255.255.0 Vlan15 192.168.60.1 255.255.255.0 Vlan16 192.168.70.1 255.255.255.0 Vlan17 192.168.80.1 255.255.255.0 Table 8: Multilayer Switch
  • 7. 7 3.0 Feasibility Study 3.1 Network Scope This proposed network is designed for AHB Bank in Glenmarie Business Park, Shah Alam Malaysia. Ashyaf, who is our client requires 6 main departments for their new outlet which are:  Internal IT support  ATM services  Consumer Banking  Investment Banking  Loans  Insurance AHB Bank provided us with a budget of RM200,000 to design a network for them that has high performance and cost effectiveness. 3.2 Objectives Below are the main goals of the network being to achieve several operational objectives which are:  Every department network is separated. All staffs can communicate through emails and an internal chatting system using port 465.  There shouldbe aguest Wi-Fi is provided to customers. This is an isolated network isolated with only web browsing capabilities.  The IT department consists of a small team that the staffs are mainly performing operational tasks instead of planning and implementations. Your team is required to provide detail documentations so that the IT staffs can troubleshoot their systems with references.  Your team are working to strike a balance between network performance, security and cost effectiveness so that your team can close this deal. 3.3 DesignFeatures and Coverage One of the features that we apply is ACL (Access Control-List) Vlan/Subnet ACL Permission Vlan10: IT Department - Remote access (SSH) to all the networking devices for troubleshooting, except ATM network.
  • 8. 8 - perform remote into the branch through VPN for troubleshooting. - communicate throught emails and an internal chatting system using port 465. Vlan11: ATM - Isolated network and directly connect to Headquarter network through 5556 port. - All staffs including IT support has no access to the ATM network. Vlan12: Consumer Banking - communicate throught emails and an internal chatting system using port 465. Vlan13: Investment Banking - communicate throught emails and an internal chatting system using port 465. - Internet access (HTTP and HTTPS only) to support overseas customers. Vlan14: Loans - communicate throught emails and an internal chatting system using port 465. - Internet access with port 9999 to check customer credit scores. Vlan15: Insurance - communicate throught emails and an internal chatting system using port 465. - port 7772 to connect to national insurance portal. -No internet access. Vlan16: Guest Wifi -Only can connect to WiFi Table 9: Access Control List Permissions 3.4 DesignAssumptions This network design is only meant for a small scale organisation (AHB Bank) where the access point could support approximately 200 users. The extra or unused port either on layer 2 or 3 switch could be reserved for further use especially when there is a need of expanding the network usage. 4.0 Network Needs Analysis 4.1 Data Types & Sources for Daily Operations 4.2 Number of Users & Priority Levels The consumer department would be the main users that occupies 60% of the network usage while the IT department would have the highest priority where they are tasked with taking care of networking devices of AHB bank and they are able to Access all the department’s network with the ability to provide VPN services to remote department and perform actions. The ATM
  • 9. 9 department occupies 15% of the network usage and it is isolated network and directly connect to Headquarter network. The loans and Investment Department will also occupies 10% each of the network usage for check the customer credit score and support overseas customers. While the rest of the departments are within low priority as they do not require to use the network extensively compared to the other departments. 4.3 Security Requirements Here are the main objectives of our network’s security requirements which comprises of: - Users are required to change their password every 90 days. - The IT Department are given the privilege to access all the group’s network and they are able to conduct troubleshooting activities remotely to all the groups’ network. - Firewalls will be implemented within the server to prevent unauthorized users from accessing the networks. - All routers are provided with the security of radius aaa server and have their own usernames and passwords. 4.4 Transmission SpeedRequirements We recommend a minimum connectivity speed of 100 Mbps and a target speed of 1 Gbps per 100 users for AHB Bank by 2019. In preparing for nextgeneration applications, it is critical to replace 100 Mbps shared-bandwidth hubs in the wiring closet with Ethernet and Fast Ethernet (100/1000 Mbps) or Gigabit Ethernet (10000 Mbps) switches. These switches dedicate 100-, 1000- or 10000-Mbps bandwidth to an individual LAN or WLAN node. 4.5 Load Variations Estimates Based on AHB Bank operating hours, the network will be mainly used during the weekdays from 9 a.m to 5 p.m from Monday to Friday. Peak network traffic volume is expected to experience during 10 a.m up till 4 p.m.
  • 10. 10 Average required throughput upon LAN during work hours are 5 Mbps while expected peak traffic load would be ranging 10 Mbps - 20 Mbps. We are designing the network in such a way to accommodate the peak traffic load instead of the average required throughput. 4.6 Reliability Requirements The network will be designed to be running with an expected uptime of 99.99% with an undiscovered error rate of 0.01%. 5.0 Network Diagramand Topologies 5.1 Site 1 – IT Department Figure 1: Site 1 - IT Dept. Design This site consists of 2 IT administrators, and 1 server. The default gateway got IT Department is 192.168.10.1/24. IT Department is using VLAN 10 to control access between the groups.
  • 11. 11 Figure 2: Main Multilayer Switch (Layer 3 Switch) Trunk (encapsulation dot1q) is used at the Multilayer switch (layer 3 switch) as we want create VLAN traffic between the switches. A trunk connection is a normal link that is able to pass traffic from different VLANs and has a method to separate traffic between VLANs. DHCP protocol are used on layer 3 switch so that it could enable automatic assignment of IP configurations for nodes on the network. It is efficient as we do not have to assign all the IP addresses manually. The DHCP server accepts address assignment requests and renewals from the client and assigns the addresses from predefined groups of addresses within DHCP address pools. These address pools are also be configured to supply additional information to the requesting client such as the IP address of the Domain Name System (DNS) server.
  • 12. 12 5.2 Site 2 – ATM Figure 3: Site 2 -ATM. Design As for site 2, this would be the ATM Department which consists 3 ATM and 1 Switch of ATM. ATM Department is using VLAN 11 to control access between the departments. 5.3 Site 3 – Consumer Banking Figure 4: Site 3 - Consumer Banking. Design The figure above is the site dedicated for the Consumer Banking department. It consists 3 Consumer PC and 1 Switch for Consumer Department, and it’s using VLAN 12 to control access between the departments.
  • 13. 13 5.4 Site 4 – Investment Banking Figure 5: Site 4 - Investment Banking Design As for Site 4, This is Investment Banking which consists 3 PC of Investment and 1 switch for using VLAN 13 to control access between the department. 5.5 Site 5 – Loans Figure 6: Site 5 - Loans Design This Site 5 is for the Loans Department and its consists 3 Loans PC for staff and 1 switch for Loans Department. Its using VLAN 14 to control access between the departments.
  • 14. 14 5.6 Site 6 – Insurance Figure 7: Site 6 - Insurance Design The figure above is the site dedicated for the Insurance department. It consists 3 Insurance PC for staff and 1 Switch for Insurance Department, and it’s using VLAN 15 to control access between the departments. 5.7 Site 7 – Guest Wifi Figure 8: Guest Wifi Design As for Site 4, This is Guest Wifi Design which only consists 1 Wireless router and 1 example device of user for access into internet. Its using VLAN 16 that only allow users to access the internet.
  • 15. 15 5.8 Site 8 – Site-to-site VPN Figure 9: VPN Design Site-to-Site IPSec VPN Tunnels are used to allow the secure transmission of data and perform remote into the branch for troubleshooting. The VPN tunnel is created over the Internet public network and encrypted using a number of advanced encryption algorithms to provide confidentiality of the data transmitted between the two sites.
  • 16. 16 5.9 Overview of entire network
  • 17. 17 6.0 Items and Labor cost Model Quantity Price per unit (RM) Total (RM) Hardware cost WS-C2960-24TT-L Cisco 2960 Switch 6 963 5778 CISCO1841 Cisco 1841 Router 2 2445 4890 WS-C3650-24PS-S Catalyst 3650 Switch 1 5121 5121 100m CAT5e Ethernet Cable 40 212 8480 TP-LINK EAP115 1 179 179 Cisco ISR4321- AX/K9 ISR 4321 1 4978 4978 Cisco UCS C-Series Rack Servers 1 6573 6573 PC 14 5000 70000 Total (RM) 105999 Labor / intangible cost Unifi 100Mbps (per month 125 125 Technical support (per month) 5 4000 20000 Electrician 5 3000 15000 Network design and planning (hours) 24(hours) 20000 20000 Total (RM) 161124 Table 10: Items and Labor Cost 7.0 Network DisasterRecovery Planning A network disaster recovery plan includes a set of procedures required to effectively respond to a disaster that affects a network and causes its disruption. The main purpose of network disaster recovery is to ensure that services can be delivered to customers despite a disruption in network connectivity.  Back up network configuration files The main aim is to ensure that a network is restored to its normal state as rapidly as possible. That is why it is important to regularly back up network configuration files, including the initial
  • 18. 18 parameters and settings for configuring network devices. Regarding this, you are advice to install third-party data protection software, which can be used to back up and recover critical data when your infrastructure is hit by a disaster.  Regularly test and update the plan By regularly testing and updating network disaster plans, it will reduce the chances of panicking when a network disaster occurs. IT recovery team will be more ready and prepared to deal with network disasters.  Assess potential risks and threats You also need to determine risks and threats which your organization is most exposed to that can disrupt your network services. After assessing potential dangers, you can come up with preventive measures to stop them from occurring to reduce the possible impact on your infrastructure.  Create an IT recovery team and assign responsibilities It is not enough to create a network disaster recovery plan; you should also decide who will implement the plan when an actual disaster strikes. So, by having an IT team recovery team will have the organization prepared for disaster recovery. Each recovery team member should be assigned with a specific role and a unique set of responsibilities to avoid any confusion and panic during a disaster recovery event.  Document steps of the network disaster recovery process. By documenting the steps of the network disaster recovery process will avoid confusion when the actual network disaster occurs. By listing the document also helps identify the weakness of the infrastructure of the organization which indirectly reduce network disaster from occurring. 7.1 Objectives of DisasterRecovery Plan  To limitthe extentof disruptionanddamage.  To minimize the economicimpactof the interruption.  To establishanalternativemeansof operationinadvance.  To train personnel withemergencyprocedures
  • 19. 19 7.2 Risk Assessments  Identify Possible Threats A high-level risk assessment can still be done by involving the simplest network component where it can still pose a threat if it has an IP address on the network, stores any sensitive data, and/or allows users to access it over the network.  Rate Each Risk and Impact Each risk is can be classified as low, medium or high risk. This helps to prioritize where you should focus most of your effort initially, and you work down your list to the medium and low-risk resources.  Analyze Your Protection Firewalls and antivirus software installed on desktops. Analyze any cyber security protection in place, because it reduces risk. This step might affect your priority because you could have a high-priority item that already has the best protection. This type of resource would then be a lower priority. 7.3 Emergency Response Procedure  Evaluate current plans, procedures and incident  Identify hazards  Emergency resources  Review codes and regulations  Training Programs  Communication  Write the plan 7.4 Recovery Response Procedure Prevention  Focuses on creating concrete plans, training, hazard response plans and exercises well ahead of a disaster to prepare your organization, through proactive planning Preparedness
  • 20. 20  A continuous cycle of planning, organizing, training, equipping, exercising, evaluating, and taking corrective action. Mitigation  Effort to reduce loss property by developing structural and non-structural measures that will mitigate the effects of a disaster 8.0 References A Short Guide to Network Disaster Recovery Planning. (2019, March 5). Retrieved from https://www.nakivo.com/blog/create-effective-network-disaster-recovery-plan/